[1] |
RIVEST R L . Cryptography and machine learning[C]// The International Conference on the Theory and Application of Cryptology. 1991: 427-439.
|
[2] |
RAMZAN Z . On using neural networks to break cryptosystems[J]. Manuscript, 1998.
|
[3] |
POOJA M . Classification of ciphers[R]. Indian Institute of Technology,Kanpur, 2001.
|
[4] |
DILEEP A D , SEKHAR C C . Identification of block ciphers using support vector machines[C]// The 2006 IEEE International Joint Conference on Neural Network Proceedings. 2006: 2696-2701.
|
[5] |
MANJULA R , ANITHA R . Identification of encryption algorithm using decision tree[C]// International Conference on Computer Science and Information Technology. 2011: 237-246.
|
[6] |
MISHRA S , BHATTACHARJYA A . Pattern analysis of cipher text:a combined approach[C]// 2013 International Conference on Recent Trends in Information Technology (ICRTIT). 2013: 393-398.
|
[7] |
BARBOSA F , VIDAL A , MELLO F . Machine learning for cryptographic algorithm identification[J]. Journal of Information Security and Cryptography (Enigma), 2016,3(1): 3-8.
|
[8] |
CHOU J W , LIN S D , CHENG C M . On the effectiveness of using state-of-the-art machine learning techniques to launch cryptographic distinguishing attacks[C]// Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence. 2012: 105-110.
|
[9] |
赵志诚 . 基于机器学习的密码体制识别研究[D]. 郑州:信息工程大学, 2018.
|
|
ZHAO Z C . The Research of Cryptosystem Recognition Scheme Based on Machine Learning[D]. Zhengzhou:Information Engineering University, 2018.
|
[10] |
李洪超 . 基于密文特征的密码算法识别研究[D]. 西安:西安电子科技大学, 2018.
|
|
LI H C . Cipher-text features based cipher system recognition[D]. Xi’an:Xidian University, 2018.
|
[11] |
SOUZA W A R , TOMLINSON A . A distinguishing attack with a neural network[C]// 2013 IEEE 13th International Conference on Data Mining Workshops. 2013: 154-161.
|
[12] |
PAMIDIPARTHI S , VELAMPALLI S . Cryptographic algorithm identification using deep learning techniques[M]// Evolution in Computational Intelligence. 2021: 785-793.
|
[13] |
曹莉茹 . 基于深度学习的密码算法识别研究[D]. 成都:电子科技大学, 2021.
|
|
CAO L R . A research of cryptographic algorithm recognition scheme based on machine learning[D]. Chengdu:University of Electronic Science and Technology of China, 2021.
|
[14] |
ZAMAN J , GHOSH R . Review on fifteen statistical tests proposed by NIST[J]. Journal of Theoretical Physics and Cryptography, 2012,1: 18-31.
|
[15] |
HOFFSTEIN J , SILVERMAN J H . Random small hamming weight products with applications to cryptography[J]. Discrete Applied Mathematics, 2003,130(1): 37-49.
|
[16] |
WU C K , FENG D . Boolean function representation of S-boxes and boolean permutations[M]// Boolean Functions and Their Applications in Cryptography. 2016: 217-241.
|
[17] |
COVER T M , THOMAS J A . Entropy,relative entropy and mutual information[J]. Elements of Information Theory, 1991,2(1): 12-13.
|
[18] |
BIAU G , SCORNET E . A random forest guided tour[J]. Test, 2016,25(2): 197-227.
|
[19] |
YING C , QI GUANG M , JIA Chen L ,et al. Advance and prospects of AdaBoost algorithm[J]. Acta Automatica Sinica, 2013,39(6): 745-758.
|
[20] |
AKKAR M L , GIRAUD C . An implementation of DES and AES,secure against some attacks[C]// International Workshop on Cryptographic Hardware and Embedded Systems. 2001: 309-318.
|
[21] |
BIHAM E , ANDERSON R , KNUDSEN L . Serpent:a new block cipher proposal[C]// International Workshop on Fast Software Encryption. 1998: 222-238.
|
[22] |
LIU G , GHOSH M , SONG L . Security analysis of SKINNY under related-tweakey settings[J]. Cryptology ePrint Archive, 2016.
|
[23] |
BOGDANOV A , KNUDSEN L R , LEANDER G ,et al. PRESENT:an ultra-lightweight block cipher[C]// International Workshop on Cryptographic Hardware and Embedded Systems. 2007: 450-466.
|
[24] |
BANIK S , BOGDANOV A , ISOBE T ,et al. Midori:a block cipher for low energy[C]// International Conference on the Theory and Application of Cryptology and Information Security. 2015: 411-436.
|
[25] |
PARK J , YUN Y , KIM Y D ,et al. Design and implementation of ARIA cryptic algorithm[J]. Journal of the Institute of Electronics Engineers of Korea SD, 2005,42(4): 29-36.
|
[26] |
SCHNEIER B . The Twofish encryption algorithm[J]. Dr.Dobb's Journal:Software Tools for the Professional Programmer, 1998,23(12): 30-34.
|
[27] |
BEAULIEU R , SHORS D , SMITH J ,et al. The SIMON and SPECK lightweight block ciphers[C]// Proceedings of the 52nd Annual Design Automation Conference. 2015: 1-6.
|
[28] |
HALAGALI B P , DESAI V V . Implementation of chaos based cryptography in kasumi block cipher[C]// 2018 International Conference on Communication and Signal Processing (ICCSP). 2018: 165-169.
|
[29] |
SUZAKI T , MINEMATSU K , MORIOKA S ,et al. Twine:a lightweight,versatile block cipher[C]// ECRYPT Workshop on Lightweight Cryptography. 2011, 2011.
|
[30] |
THAKUR J , KUMAR N . DES,AES and blowfish:symmetric key cryptography algorithms simulation based performance analysis[J]. International Journal of Emerging Technology and Advanced Engineering, 2011,1(2): 6-12.
|